2018
DOI: 10.1109/tmm.2018.2838334
|View full text |Cite
|
Sign up to set email alerts
|

Robust Coverless Image Steganography Based on DCT and LDA Topic Classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
117
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 184 publications
(117 citation statements)
references
References 36 publications
0
117
0
Order By: Relevance
“…More recently, Jiang et al designed a reversible data hiding in encrypted domain scheme with low computational complexity for three-dimensional meshes [20]. Zhang et al suggested a coverless steganographic algorithm based on discrete cosine transform and latent dirichlet allocation topic classification, having robustness against common image processing and better ability to resist steganalysis [21].…”
Section: Related Workmentioning
confidence: 99%
“…More recently, Jiang et al designed a reversible data hiding in encrypted domain scheme with low computational complexity for three-dimensional meshes [20]. Zhang et al suggested a coverless steganographic algorithm based on discrete cosine transform and latent dirichlet allocation topic classification, having robustness against common image processing and better ability to resist steganalysis [21].…”
Section: Related Workmentioning
confidence: 99%
“…The algorithm proposed in Liu et al [Liu, Zhang, Liu et al (2018); Duan and Song (2018)] combined the coverless information hiding algorithm with machine learning, and used the generated model to generate images related to secret information for transmission. The paper Zhang et al [Zhang, Peng and Long (2018)] generated the feature sequence through the relation between Direct Current coefficients in the adjacent blocks.…”
Section: Related Workmentioning
confidence: 99%
“…We compare our embedding capacity with four existing coverless image steganography methods. Their approaches are coverless image steganography using partial-duplicate visual retrieval [Zhou, Mu and Wu (2017)], denoted as CIS-PDVR, coverless image steganography method based on bag-of-words [Zhou, Cao and Sun (2016)], denoted as CIS-BOW, coverless image steganography based on SIFT and BOF [Yuan, Xia and Sun (2017)], denoted as CIS-BOF and robust coverless image steganography based on DCT and LDA [Zhang, Peng and Long (2018)], denoted as CIS-DCT. So far, the largest capacity is the method proposed in CIS-PDVR.…”
Section: Capacity Of Steganographymentioning
confidence: 99%
“…More recently, machine learning based approaches have been considered to generate covers for steganography [7,34,36]. In [44], Zhang et al proposed a coverless steganography method based on Discrete Cosine Transform (DCT) and Latent Dirichlet Allocation (LDA) topic classification, where images that each represent a segment of the hidden message are selected from a database.…”
Section: Generative (Coverless) Information Hidingmentioning
confidence: 99%
“…Therefore, it is necessary to invent new steganographic methods to make information hiding more secure. One new approach called generative (also known as coverless) information hiding is to move away from using a selected (pre-existing) cover object, but to embed hidden data into one or more generated objects that did not exist [7,26,27,34,36,38,41,44].…”
Section: Introductionmentioning
confidence: 99%